Operation Security Sample Clauses

Operation Security. The “CONCESSIONAIRE” shall be responsible for providing the Service according to the quality and security standards established by “THE MINISTRY”, complying with conditions 4.2., 5.1., 7.4., 7.5., 7.8. and 11.1 hereof, as well as those determined internationally.
AutoNDA by SimpleDocs
Operation Security. The Operator must: • ensure that any changes to IT systems that are performing work in respect of the [COMPANY NAME] information do not have any negative security implications. • follow documented change management practices and procedures.
Operation Security. In order to supervise Party B’s operation activities and maintain uniform external image of the Commercial Square, where Party B breaches any provision of the Contract, Party A has the right to deduct the penalty, compensation and any other sum payable by Party B from the operation security, and Party B shall make up for the deficiency of the operation security within three days. Party A shall return the balance of operation security to Party B (without interest) within 90 days upon termination of the Contract.
Operation Security. 10.2.1 As a condition to the issuance of the Completion Certificate, the Concessionaire shall submit to the Grantor, an unconditional and irrevocable on-demand bank guarantee, issued by a bank with a credit rating of at least AA- under the Standard and Poor's rating or with Aa3 under the Xxxxx'x rating or such other rating as the relevant Public Authority may agree, in accordance with the Applicable Law an initial amount of five million US Dollars (USD5,000,000) (and subject to adjustments in accordance with Article 10.2.6) and in the form set out in Appendix 9 (Security Forms) to secure the due performance of the Concessionaire's obligations under this Agreement during the Operation Period (the "Operation Security"). If the rating of the bank issuing the Operation Security falls at any time below the rating required under this Article 10.2.1, the Concessionaire shall, as soon as possible, issue a new Operation Security for the same amount remaining at the time of such occurrence, with a bank of a rating complying with the rating required under this Article 10.2.1.
Operation Security. 10.2.1 As a condition to the issuance of the Completion Certificate, the Concessionaire shall submit to the Grantor, an unconditional and irrevocable on-demand bank guarantee, issued by a bank reasonably acceptable to the Grantor and with a credit rating of at least BBB under the Standards and Poor's rating or with Baa2 under the Xxxxx'x rating for an amount of ten million US Dollars (USD10,000,000) and in the form set out in Appendix 9 (Security Forms) to secure the due performance of the Concessionaire's obligations under this Agreement during the Operation Period (the "Operation Security"). If the rating of the bank issuing the Operation Security falls at any time below the minimum-required rating specified in this Article, the Concessionaire shall, as soon as possible, issue a new Operation Security for the same amount remaining at the time of such occurrence, with a bank of a rating complying with this Article.

Related to Operation Security

  • UNION SECURITY 7.01 The Employer shall deduct monthly from the pay due to each employee who is covered by this Agreement a sum equal to the monthly Union dues of each such employee. Where an employee has no earnings during the first payroll period, the deduction shall be made in the next payroll period where the employee has earnings, within that month. The Union shall notify the employer in writing of the amount of such dues from time to time. The Employer will send to the Union its cheque for the dues so deducted in the month following the month in which the dues are deducted. When arrears or adjustments are submitted retroactively, the dues month and an explanation will accompany any such dues.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • INFORMATION SECURITY SCHEDULE All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between Transfer Agent and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated January 31, 2017 (the “Agreement”). Transfer Agent and Fund hereby agree that Transfer Agent shall maintain and comply with an information security policy (“Security Policy”) that satisfies the requirements set forth below; provided, that, because information security is a highly dynamic space (where laws, regulations and threats are constantly changing), Transfer Agent reserves the right to make changes to its information security controls at any time and at the sole discretion of Transfer Agent in a manner that it believes does not materially reduce the protection it applies to Fund Data. From time to time, Transfer Agent may subcontract services performed under the Agreement (to the extent provided for under the Agreement) or provide access to Fund Data or its network to a subcontractor or other third party; provided, that, such subcontractor or third party implements and maintains security measures Transfer Agent believes are at least as stringent as those described in this Security Schedule. For the purposes of this Schedule “prevailing industry practices and standards” refers to standards among financial institutions, including mutual funds, and third parties providing financial services to financial institutions.

  • Physical Security Contractor shall ensure that Medi-Cal PII is used and stored in an area that is physically safe from access by unauthorized persons during working hours and non- working hours. Contractor agrees to safeguard Medi-Cal PII from loss, theft or inadvertent disclosure and, therefore, agrees to:

Time is Money Join Law Insider Premium to draft better contracts faster.